University of Illinois Urbana-Champaign

Academic Unit
Collection
Author(s)
Keyword(s)
Type of Resource
Showing 961–990 of 31,776 items
Thumbnail for AMGA Evaluation Final Report
AMGA Evaluation Final Report
The Technology Investigation Service's Technology Evaluation Team

Thumbnail for X2go Remote Desktop Solution Evaluation Report
X2go Remote Desktop Solution Evaluation Report
The Technology Investigation Service's Technology Evaluation Team

Thumbnail for Lmod Evaluation Internal Report
Lmod Evaluation Internal Report
The Technology Investigation Service's Technology Evaluation Team

Thumbnail for Enforcing End-to-End Proportional Fairness with Bounded Buffer Overflow Probabilities
Enforcing End-to-End Proportional Fairness with Bounded Buffer Overflow Probabilities
Singh, Nikhil; Sreenivas, Ramavarapu S.; Shanbhag, Uday V.

Thumbnail for Characterization of Repeating Dynamic Code Fragments
Characterization of Repeating Dynamic Code Fragments
Spadini, Francesco; Fertig, Michael; Patel, Sanjay J.

Thumbnail for Modeling Cultural Collections for Digital Aggregation and Exchange Environments
Modeling Cultural Collections for Digital Aggregation and Exchange Environments
Wickett, Karen M.; Isaac, Antoine; Fenlon, Katrina S.; Doerr, Martin; Meghini, Carlo; Palmer, Carole L.; Jett, Jacob

Thumbnail for Face Recognition with Contiguous Occlusion Using Markov Random Fields
Face Recognition with Contiguous Occlusion Using Markov Random Fields
Zhou, Zihan; Wagner, Andrew; Wright, John; Mobahi, Hossein; Ma, Yi

Thumbnail for Duo Security Evaluation Public Report
Duo Security Evaluation Public Report
The Technology Investigation Service's Technology Evaluation Team

Thumbnail for Simple Event Correlator (SEC) Evaluation Public Report
Simple Event Correlator (SEC) Evaluation Public Report
The Technology Investigation Service's Technology Evaluation Team

Thumbnail for Accumulative fatigue damage in concrete
Accumulative fatigue damage in concrete
Hilsdorf, Hubert; Kesler, Clyde E.

Thumbnail for Discovering Application-Level Insider Attacks Using Symbolic Execution
Discovering Application-Level Insider Attacks Using Symbolic Execution
Pattabiraman, Karthik; Nakka, Nithin; Kalbarczyk, Zbigniew; Iyer, Ravishankar